Highly secure document exchange any place and any

No 2 | 2016
Highly secure document exchange
any place and any time
Focus
Focus
From punched cards
to modern, highly
secure databases
Page 3
7 | Diplomacy in a networked world
1 1 | Protection of highly sensitive data –
more important than ever
Dear Readers
Mobile access to information in the form of electronic
data is part of everyday life in our modern society.
Given this global availability, companies and government authorities face huge challenges, which call for a
holistic approach to information security solutions.
1 4 | Interview with Peter Fischer,
Delegate of the Federal IT Steering Unit
(FITSU) of the Swiss Confederation
16 | Secure cloud computing –
fact or illusion?
20 | Quantum computers:
the supercomputers of the future
That is why information classification has established
itself worldwide as a method of assuring the integrity
and confidentiality of documents. Peter Fischer,
Delegate of the Federal IT Steering Unit (FITSU),
explained in an interview how the Swiss Confederation deals with this topic.
From punched cards to modern,
highly secure databases
Symmetrical and asymmetrical encryption methods
are employed for saving and sending highly sensitive
data. This issue of CryptoMagazine tells you how these
methods work and whether they are threatened by
quantum computers.
The secure management of electronic documents is becoming an ever bigger challenge. One reason is the
need to be able to access databases at any time and from any location. This capability is also desired by
government ministries, national banks and armed forces today.
Giuliano Otth
President and
Chief Executive Officer
Publication details
Published twice a year | Print run | 6,200 (German, English,
French, Spanish, Russian, Arabic)
Publisher | Crypto AG, P.O. Box 460, 6301 Zug, Switzerland,
www.crypto.ch
Editor-in-chief | Anita von Wyl, Crypto AG, T +41 41 749 77 22,
F +41 41 741 22 72, [email protected]
Reproduction | Free of charge with the consent of the editorial office.
Courtesy copies requested. Copyright by Crypto AG
Illustrations/photo credits | Crypto AG: p. 2 | illugraphic: p. 3 |
Keystone: pp. 11, 13 | Peter Fischer: p. 15 | Shutterstock: cover,
pp. 3, 4, 7, 9, 15, 16, 18, 20, 21, 23
Even major powers are not immune from harm despite their
seemingly unlimited resources. In recent years, so-called
whistle-blowing websites have been regularly naming and
shaming governments of small countries but also very large
ones. They have published strictly confidential documents.
Even secret service information has been made public in this
way. The scandals are anything but accidental in light of the
rapid pace of technological change. And the prevailing
consensus is that the risk of these data leaks can be reduced
considerably with the right methods.
But let us take one thing at a time. Human beings have been
occupied with document protection ever since documents have
been around. Wax and lacquer seals were already being used in
medieval and early modern times as a means of certifying
documents. A seal back then was also able to prove the
integrity of a document – if, say, it was in an envelope sealed
in this manner.
CryptoMagazine 2 / 16 | 3
Focus
Focus
Then, however, the subject took on a completely new dimension when the physical world gave way to the digital world.
The late 1960s and early 1970s saw the emergence of the first
electronic databases. They triggered a set of developments
whose end is not even in sight yet.
Two technologies converge
A prerequisite for the emergence of databases was the convergence of two lines of technological development according to
Carl August Zehnder, Professor Emeritus for Computer Science
at the Swiss Federal Institute of Technology Zurich. In an
article, Zehnder wrote that the combination of steadily improving computers and increasingly powerful data processing
is what made databases possible in the first place.
For highly sensitive data, the
question of the adequate protection level is quickly answered.
Data processing has its roots in the nineteenth century. Initially,
punched cards allowed routine tasks to be carried out by
machine; a loom controlled by punched cards is one example of
this application. In the 1890 national census in the United States,
punched cards were employed for the first time not as control
elements but as data media. The first computers date back to
World War II. Konrad Zuse, a German civil engineer, is the best
known developer of these devices. His fully automatic Z3 from
1941 is considered the first functional computer in the world.
From the 1960s, the technologies of computers and data
processing converged. It then became possible for several
individuals to work simultaneously on mainframe computers,
according to Zehnder. The database as defined by Zehnder had
come into being, i.e. "a computer-assisted device for the orderly
saving and retrieval of large volumes of data by multiple users".
Distance suddenly irrelevant
Since then, computers have become increasingly smaller and
more powerful. And the 1990s saw the dawn of a new era:
with the advent of the Internet, geographic distance suddenly
became irrelevant. What had begun as a data exchange system
among individual universities spread rapidly across the entire
globe. Today everyone wants to be able to surf the Internet on a
computer or smartphone at any time even while on the move.
4 | CryptoMagazine 2 / 16
CryptoMagazine 2 / 16 | 5
Focus
This kind of mobile access to databases is therefore increasingly
becoming a matter of course. Users want to be able to access
and modify the desired documents at their home office, on the
way to work, or at the customer's premises – and do so with no
restrictions in terms of operation. Parallel to that, databases
are becoming more complex. Simple document archives have
become key elements for business processes also used for
quality control and for compliance with legal and financial
regulations.
What is an adequate level of protection?
In the meantime, everyone is aware of data protection. But the
prevailing opinion is that most everyday systems cannot offer
full security. There are too many hardware and software
components in play for that, and individual elements have to
be replaced or updated too often. The frequent occurrence of
malware is proof of that. In many cases, better protection is also
limited by financial budgets: companies have to ask themselves
the question: what is an adequate level of protection?
Experts say that the previous
"need to know" culture has evolved
into a "need to share" culture.
This question does not arise for highly sensitive data because it
automatically requires a higher security level. Thus, diplomats
stationed at an outpost have to be able to send data to headquarters without anyone else being able to read it. The same
holds true for the top officials of national banks. They also have
to be able to access their database at any time and from any
place, so they can intervene if necessary. Of course, security
systems of nuclear power plants or of large dams are likewise
classified as highly sensitive.
And the same is true not least of the armed forces: a crucial
factor in modern warfare is quick, secure access to information material. Experts say that the previous "need to know"
culture has evolved into a "need to share" culture. The unhindered and secure exchange of information is therefore
a central element in the success of an operation. Put simply:
a war can hardly be won any more without well-protected
and constantly accessible databases.
6 | CryptoMagazine 2 / 16
This protection entails not only safeguarding the databases
against intruders and thereby preventing tampering. Equally
important is protection from sabotage. This term includes
attacks that make database access more difficult for users or
even impossible for short or long periods. In addition,
sabotage also signifies attacks aimed at destroying the data.
Software is not enough
To provide adequate protection for highly sensitive data, it is
often not enough merely to rely on software solutions for login
and data transmission. What is in fact needed is hardware that
encrypts data traffic with individual algorithms. This encryption is taken care of, for example, by modules plugged into a
notebook or inserted in a smartphone. This approach protects
data while it is being retrieved, edited and sent. An important
aspect of working outside a protected network is that data –
such as e-mails for example – is also protected when saved
locally. Comprehensive systems do just that.
The decisive factor for overall system security is that all points
of access to a database are protected. Classical copper cables as
well as modern fibre-optic networks can usually be tapped,
however. In the governmental realm, use is also made of
microwave and satellite links, which are more efficient,
especially in times of crisis or in remote areas. Microwave
technology in particular is especially susceptible to covert
tapping and sabotage if not sufficiently protected.
Diplomacy in a networked world
In the twenty-first century, successful foreign policy is based on secure information and communication.
New technologies have opened up communication channels for players worldwide that can be powerful
instruments, especially also for diplomats. After all, diplomatic activity is performed increasingly in the eye
of the digital public. Nevertheless, it is vital to retain secrecy as a delineating factor for complex negotiations
– regardless of which communication technologies are utilised.
The digital world is no longer conceivable without the hashtag (#). In 2007, the hash character (number sign) began being
employed to tag terms. Ever since, its use has multiplied millions of times over, also in embassy communication. "Have you
ever been to #Geneva?" The Swiss embassy in the US recently
asked its followers this question on Twitter. The reason for the
tweet was a TV report on Geneva, the Swiss city known the
world over as headquarters of international organisations,
and its multicultural population. In our digital age, the Swiss
foreign ministry views these references, but also event tips
aimed at a broad public, as being suitable means for conveying
a fresh image of Switzerland and for forging new networks.
The first fledgling steps of the Swiss Confederation on the stage
of e-diplomacy go back to 2012. In a pilot project, ten Swiss
representatives abroad began making forays into social media.
The activities at the time were limited at most to posting three
messages a day on the Facebook page and on the Twitter
channel. Four years later, the volume has quadrupled and the
reach has grown markedly. Today, more than 2,500 people
follow what Swiss embassy personnel in Washington DC (USA)
are communicating on its Twitter channel; its followers on
Facebook number 50,000. In the meantime, social media are
considered important tools of diplomatic work.
And what does the future have in store? Experts agree that
database protection will become more and more complex.
Additional attack scenarios are conceivable given the further
digitisation of society and the spread of the Internet of Things
(IoT). IoT entails machines communicating increasingly
among themselves. Carl August Zehnder, Professor Emeritus
at the Swiss Institute of Technology Zurich, had this to say of
the future: "The technical advances in IT will continue and
give rise to amazing new possibilities for all of us."
CryptoMagazine 2 / 16 | 7
Whether digital or conventional –
the secure and confidential exchange of information must be assured at all times regardless of the
means of communication used.
Diplomacy in the digital age
As a tool of public diplomacy, new technologies are used as a
means of involving the growing and changing communities of
players everywhere in the world with an eye to building up
relationships. The object is to understand the needs and special
characteristics of other countries, cultures and people, to
communicate one's own views, to rectify incorrect perceptions
and to counter governmental propaganda actively. Classical
diplomacy concentrated on the relationship between governments on a formal level whereas the twenty-first century has
seen a marked increase in the number of players relevant to
diplomacy. These players include non-governmental organisations, cultural and academic facilitators, corporations, lobbyists, media and of late, also the local population in particular.
The intent is to influence their perception or opinion in one's
own interest by making full efficient use of the possibilities of
digital diplomacy.
This change in the diplomatic service was set off by digitisation
and its end is not yet in sight. Until now, it has reduced the
importance of diplomats' legal and political functions while
augmenting their symbolic functions in the form of public
diplomacy. The ambassador is present on all channels, holds
lectures, gives interviews and explains the policy of his own
country to the public in his host country.
However, the greater use of social media as an instrument
of e-diplomacy also entails risks and consequently requires
certain guidelines. Otherwise, a verbal exchange of blows can
ensue between governmental representatives. The effect is
counter-productive on both sides because it can generate
negative headlines. And as before, e-diplomacy experts point
out that the following rule still applies: it is still not (yet)
permitted to tweet each other about the successful signing
of an international treaty.
8 | CryptoMagazine 2 / 16
Technology accelerates the pace of diplomacy
Technological progress has accelerated not just the trend
toward digital diplomacy especially in PR work, but also the
pace of diplomacy as a whole. This trend was enabled by the
nearly full-coverage supplementation or even replacement of
analogue cable-bound communication channels – such as the
public phone system, also known as PSTN – with fast digital,
packet-orientated communication channels. The latter are
increasingly also wireless, in other words, radio-based. In times
of crisis, these locally available terrestrial networks, such as the
PSTN, the Internet or 3G or 4G mobile networks, are at risk of
being destroyed or of failing temporarily. Certain embassies
therefore make use of short-wave radio and/or VSAT satellites
additionally or as back-ups to assure communication independent of local networks.
Short-wave radio entails substantial investments in infrastructure and permits communication that is always slow and
digitised only under certain circumstances. Embassies and
missions of the foreign ministries today therefore rely to a
larger extent on means of broadband satellite communication
such as Inmarsat BGAN, Global Xpress or Thuraya IP. These
services have become much less expensive and are available
worldwide for both stationary and mobile use. As such, they
meet the demands put on today's digital communication
technologies in our globally mobile and networked society.
Digitisation and networking are advancing rapidly. People are
using new means of communication intensively and demanding greater transparency. Against this backdrop, it is vital that
relative secrecy be retained as a delineating factor for complex
negotiations also for diplomacy in the twenty-first century.
To this extent, secrecy is considered more valuable than ever
as a common currency of diplomacy. And this is why: whether
digital or conventional – the secure and confidential exchange
of information must be assured regardless of the means of
communication used.
Even if diplomatic activity occurs increasingly in the realm of
public diplomacy, the classical areas in which diplomacy is used
remain relevant. One example would be the coordination of an
exchange of prisoners between two countries that have no
reciprocal diplomatic relations – i.e. that have no communication channels – and therefore have to rely on a third country
acting as mediator.
Complicated triangular relationship
In a constellation of this kind, the country acting as mediator
is responsible for reconciling all details of the barter with both
sides: all coordination tasks are routed through the mediator,
from the parties' negotiating positions and the documentation
of the intermediate results to the way the transfer itself proceeds. A project of this type requires highly secure standards in
communication. It is imperative that neither of the two parties
become privy to the opponent's correspondence or decisions.
In addition, it is vital that the public in neither of the two
countries find out anything either.
The mediator therefore has to use an encryption technology for
all forms of correspondence. If all employees use an algorithm
of this kind to transmit secret messages, none of the countries
can find out anything outside official communication.
"Communication remains the
central element in diplomacy.
And its protection must be
guaranteed at all times no
matter which technologies
are employed."
But not all information being sent back and forth between the
parties via the mediator is subject to the same degree of secrecy.
To avoid having to encrypt every message, it is worthwhile
classifying messages by differing degrees of confidentiality and
carrying out a coded transfer according to the level of confidentiality – as has been the practice since the earliest days of
diplomatic communication. A former top Swiss diplomat
summarised the change in diplomacy as follows: "Communication remains the central element in diplomacy. And its
protection must be guaranteed at all times no matter which
technologies are employed."
CryptoMagazine 2 / 16 | 9
Travelling
Minister
Ministry of
Foreign Affairs
Crypto Mobile
Mobile Client
Crypto Desktop
Crypto Mobile
IP VPN
Encryption
Crypto
Desktop
Crypto Red
Enclave Gateway
IP Network
Call Manager
IP VPN
Encryption
Mobile
Network
Crypto Mobile
Red enclave zone
Remote access zone
Embassy
Information security for office communication
Written communication is considered valuable in diplomacy
The Crypto Mobile Client HC-7835 gives travelling members
for a number of reasons: written messages have a binding
of the diplomatic corps remote access to central ICT infra-
character, can be archived and bridge time zones. Faxes and/
structure. This platform for users on the move is the perfect
or e-mails are therefore important applications, but so is
tool for protecting data of the most varied ICT applications
telephony in operational contexts. The end-user products
locally or by means of VPN encryption for transmission.
from Crypto AG for voice, fax, messaging and remote access
There is a mobile office system all ready for operation with
are ideal for providing maximum information security to
Mobile Client, too: the Deployable Secure Mobile Office
protect these types of communication.
DSSS-102x.
The Crypto Desktop HC-9300 is a platform that enables
top-security embassy communication with its end-user
Crypto Desktop HC-9300
applications. Fax messages can be sent not only over classical
Presenting the encryption platform for
PSTN networks but following encryption, they can also be
the modern office. Customised security
transmitted as e-mails. The encryption of e-mails, data and
applications deliver maximum security for
VoIP telephony round out the product as an office security
the transmission of voice, fax and data.
solution. If more mobility is required, the Deployable Secure
Mobile Office DSSS-1031 combined with HC-9300 provides a
mobile office that is ready to operate and has all the neces-
Crypto Mobile HC-9100
sary components and means of communication.
Crypto Mobile HC-9100 is a complete
all-round encryption platform in the
The Secure Mobile Phone with the Crypto Mobile HC-9100 is
format of a micro SD card with impressive
the mobile member of the Crypto Secure VoIP System. It uses
performance capabilities.
packet data services of mobile networks for communication
via WiFi but also via other IP networks. If a mobile satellite terminal, such as the Inmarsat BGAN terminal iSavi is employed,
Crypto Mobile Client HC-7835
the communication network can likewise be accessed via
This platform for users on the move is the
satellite communication.
perfect tool for protecting data by means
of encryption for transmission and saving.
10 | CryptoMagazine 2 / 16
Protection of highly sensitive data –
more important than ever
Information is often so sensitive that enormous risks are associated with it becoming known to the public –
for government action, for national security, for businesses. That is why a holistic approach is required for
saving, editing and transmitting digital documents.
It was revolutionary and considered unbreakable – the Enigma
encryption machine. The Wehrmacht – the German armed
forces under the National Socialists – employed the device in
World War II to encrypt its communication. It did so with great
success for a long time. Yet the Allied Powers managed to crack
the code at huge expense and effort technologically and in terms
of personnel. Suddenly, the military and intelligence agencies
gained insights into encrypted radio signals. This capability
was crucial for the Allies' victory. Historians all agree: the insights that intelligence agencies gained from the compromised
Enigma system shortened the war by years and in all probability, saved millions of human lives.
Down to the present day, the encryption of secret information
is crucial to protecting it from being tampered with or from
being accessed by unauthorised parties. Data encryption means
changing the data in such a way that its content is no longer
recognisable. Plain text is transformed into secret text.
However, "text" is an outdated term. Enigma still encrypted
solely letters whereas twenty-first century encryption systems
save and transmit data almost exclusively in digital form. This
data includes text documents and data files as well as voice,
videos, e-mails, program codes, fax and phone calls.
The advantage of encryption is this: even if unauthorised
parties tap the data, its content remains confidential. Modern
encryption techniques are based on such complex mathematical processes that it would take countless years to reconstruct
the plain text even using the fastest computer in the world.
Encrypted all the way to the recipient
Encrypting the information is just one side of an ICT security
system. It is vital that all authorised users have access again to
the sensitive data. The goal of ultra-secure document management is to make sure the documents remain encrypted until
the end users open them on their devices. Only authorised
recipients can decrypt the information. If third parties intercept
the secret data while it is being transmitted, they cannot do
anything with it.
In this end-to-end encryption, use is made of keys very
comparable to the door keys, with which everyone is familiar
from everyday life. The key closes off access to data content
and the end user, in turn, needs a key to obtain access to the
information.
CryptoMagazine 2 / 16 | 11
High-security
zone
Top
secret
Secret
Secure zone
Confidential
Trusted zone
Restricted
Public zone
Unclassified
Information classification scheme
Government organisations have a classification system for determining the degree to
which a given item of information is worthy
of protection. Classified information is commonly categorised according to a four-level
model. Any information not categorised as
belonging to one of these classification lev-
Mapped security zones
Symmetric encryption is employed for saving and sending
highly sensitive documents. With this method, all communication partners utilise the same secret key – it is used to
encrypt information at the sender's end and to decrypt it at
the recipient's end. Another big advantage of this process is
this: even documents containing large quantities of data can
be encrypted and transmitted quickly in this way.
els is deemed to be unclassified. The various
classes of information and infrastructure for
processing information are assigned to their
respective security zones.
The highly secure treatment
of documents requires holistic
architecture.
In asymmetric cryptographic processes, for their part, everyone
involved uses a mathematically created pair of keys: one of
these keys is publicly available – for instance on the Internet
and retrievable via authenticated channels – and enables data
to be encrypted in such a way that it can only be decrypted
with the appropriate private key. Asymmetric decryption is
slow, however, and is suitable only for small quantities of data.
That is why hybrid cryptographic processes are used as well:
a combination of symmetric and asymmetric encryption that
utilises the advantages of each method. Hybrid encryption is
employed, for example, in e-banking, in payment systems on
the Internet or in secure e-mail communication. You will find
out more about these two methods in the article "Quantum
computers: the supercomputers of the future" on page 20.
12 | CryptoMagazine 2 / 16
Holistic approach to security
The more sensitive the data, the better protected their integrity
and confidentiality must be. There are myriad possibilities for
attacks: information can be tapped at a storage site or while
being transmitted over a hidden channel. Keys can be stolen,
manipulated and misused. There is also the danger of individuals without access rights getting their hands on classified documents. The secret data streams flow over different media:
cables, optic fibres, satellites, radio networks and microwaves.
The confidential information does not always move on trustworthy paths. In smaller work networks, the transmission paths
are usually still clear-cut and secure. In large networks, the
communication partners are far from each other geographically
and the data is transmitted over non-trustworthy paths such as
the Internet. This approach increases the challenge put on
security measures.
The secure transmission of highly sensitive documents entails
a correspondingly higher degree of technical effort and expense
but is worthwhile: the loss of top-secret documents is often a
serious risk for a country or a company. The same holds true
for files that are compromised. Their restoration or the chore
of setting up a new security system involves effort and expense
that soon exceeds the operating costs for the original
security measures.
In light of the diverse risks and data transmission routes
involved, the ultra-secure handling of documents must be
broadly based, which calls for a holistic architecture. Along
with technical measures and cryptographic processes, organisational measures are also required, such as an orderly assignment of access rights. The data being protected is classified
according to its degree of confidentiality and divided into
security zones, which only authorised individuals have the
right to access. For instance, data with a security classification
of "secret" is processed in high-security zones, to which only
a small group of individuals have access. Or data classified as
"restricted" is processed in security zones with a lower degree
of protection, to which substantially more people have access.
Within these zones, users can securely read, edit and save the
protected documents again. Between the zones, protective
technical barriers, such as gateways of all kinds, are set up to
control the flow of data and stop it if need be. These transition
points between the individual protective zones are usually the
most vulnerable places in a security system. At these spots,
attackers can find the breaches through which they can hack
into the system.
Data whose confidentiality and integrity must meet the highest
security standards is therefore kept apart even physically from
the other zones and the Internet. This drastically limits the
access possibilities but also the chances of data being stolen.
CryptoMagazine 2 / 16 | 13
INTERVIEW
"The higher the degree of protection,
the more rigorous the personal
security check."
The Federal IT Steering Unit (FITSU) ensures implementation of the information and communication technologies
(ICT) strategy in the Federal Administration. For this purpose, it issues guidelines for the administrative units
and manages the ICT standard services. The FITSU also manages the eGovernment Switzerland Programme
Office as well as the Reporting and Analysis Centre for Information Assurance (MELANI).
Mr Fischer, what does the classification of sensitive data entail
and what benefits does it provide?
It entails categorising data according to how worthy of protection it is. In Switzerland, the authority in charge of the pertinent
regulations is the Departmental Sector for Information and
Property Security in the Federal Department of Defence,
Civil Protection and Sport (DDCPS). Using classification, we
distinguish data that is more worthy of protection from data
that is less worthy. Then, efficient preventive measures can be
taken to keep unauthorised parties from becoming privy to
information worthy of protection.
What secrecy levels does the Swiss Confederation use?
And: do Swiss practices differ from those in other countries?
In Switzerland we use the following classification system:
INTERNAL, CONFIDENTIAL and SECRET. Other countries
such as Germany, for example, have TOP SECRET as an
additional level.
Classification also involves assigning access rights.
What criteria is applied in doing so?
Basically, access to a document should be granted to those
individuals who need it to perform their job. But they must
fulfil certain conditions for each classification level, including
the necessary eligibility and education. The higher the degree
of protection, the more rigorous the personal security check,
for instance.
Secret written documents were once marked with a corresponding stamp. How is the degree of secrecy of a digital
document made known today?
CONFIDENTIAL and SECRET appear as classification
notations on the top of each page and the document is
encrypted.
14 | CryptoMagazine 2 / 16
Identification when accessing a document: what can be done
to make sure that the individual wishing to access the classified documents is in fact the authorised person?
Appropriate authorisation concepts and access systems can
be used to enable secure identification. The classified information should be made accessible only to those individuals who
absolutely need to know it (need-to-know principle).
Peter Fischer is Delegate of the Federal IT Steering Unit (FITSU) of the Swiss Confederation,
making him the top IT official in the Federal Administration. As head official, the law graduate
is in charge of the entire spectrum of information and communication technology. Fischer has
been performing these duties since 2011 and reports directly to the Federal Council.
What forms of classified information are prevalent?
Primarily text, graphics and e-mail.
"DRM solutions have their
limitations, as attacks in the
entertainment industry show."
How does the Federal Administration of Switzerland
guarantee the secure transfer of sensitive data?
From a classification CONFIDENTIAL and above,
the data must be transmitted in encrypted form.
How do you prevent the loss of sensitive data?
Through regular data backups to counter loss. Network
transition points are guarded to prevent data outflows.
Along with perimeter protection, behavioural analyses
increasingly have to be conducted in the systems in
general to counter and detect cyber attacks.
How does the Federal Administration protect sensitive data?
And: how can data theft be uncovered?
There is almost no such thing as absolute protection. Sometimes, data theft is detected, if at all, when the data is misused.
It can be determined, for example, by checking log files for
salience. Digital rights management (DRM) solutions have
their limitations, as attacks in the entertainment industry show.
Today, people demand that data be available at all times and
places. What challenges arise for security from this demand?
Decision-makers require constant access everywhere to the
data they need to perform their jobs. If possible, they should
even have this access from their smart devices that they use on
a daily basis. This capability is in conflict with the security
requirements and measures. One big challenge is to pack
adequate security into standard mobile devices; the tapping of
German Chancellor Angela Merkel's mobile phone is a case in
point. This conflict of interest cannot be completely resolved
at the moment. In fact, the goal must be to optimise the
situation based on the relative importance of the interests
involved. Psychology plays a large role. Often a solution that
is "only" safe is preferable to a solution that is extremely safe
but never used.
Has the protection of secret data improved or worsened
as a result of digitisation?
Probably worsened because the barrier of physical penetration
no longer exists with digitisation. That is why, say, secret data
in the Federal Administration is processed only in isolated
systems and networks. In exchange, however, digitisation
opens up new opportunities for data use. That plus must be
weighted accordingly.
CryptoMagazine 2 / 16 | 15
■■ Community cloud
If several private clouds join together, the combined cloud
is known as a community cloud. User access to different
private clouds can be controlled by access rights.
IaaS stands for "Infrastructure as a Service" and signifies the
foundation on which a cloud system is based. The cloud
provider is responsible for the proper functioning of the
network (virtual resources) and for access to the hardware on
offer (physical resources). However, the users have access to
the computing entities, which can be expanded or narrowed
depending on requirements.
■■ Hybrid cloud
The combination of various types of clouds (public, private
and/or community) is known as a hybrid cloud. Combinations of this kind arise if someone from within a private
cloud, say, accesses services in a public cloud or if organisations and companies are using applications in public clouds
but keep some of their data in the private cloud.
With "Service Platform as a Service" (PaaS), the provider makes
available an application that it developed. This service is utilised
primarily by software developers. The programming languages
and interfaces are specified by the provider, however.
Services are divided into three different types. Although they
are based on each other, they are considered to be independent
areas. These areas are hardware (IaaS), operating system (PaaS)
and application (SaaS).
Secure cloud computing –
fact or illusion?
Cloud computing is becoming a key work instrument for more and more companies and organisations: it makes
data available virtually everywhere and eliminates high IT costs. The crux of the matter, however, is information
security. Not all cloud services are suitable for highly secure communication.
Community
Private
Public
A
D
Public
Information technologies are changing rapidly and with them,
the possibilities users have. A key role in this process is played
by cloud computing, in other words, using IT resources over
the Internet. Data is no longer saved and processed in local
infrastructure but instead in a network of remote servers
hosted on the Internet and known as a cloud. Users can access
their own personal work environment from different devices
(laptop, tablet, mobile phone, etc.). A connection is established
to the cloud via IP (Internet Protocol) networks.
Different models and services
But the term cloud means different things to different people.
Cloud computing encompasses a variety of models and
services. The literature refers to four common models.
16 | CryptoMagazine 2 / 16
■■ Public cloud
The public cloud is a publicly accessible cloud. In this
model, the services of an external provider are open to all
users. A user is not able to determine himself which other
users share the hardware of this cloud with him. A virtual
delineation does exist, however; namely, each user sets up a
profile that is protected from being accessed by other users.
■■ Private cloud
The private cloud, for its part, is not publicly accessible.
The use of the services are available solely to operators
within a company or an internal department. The private
cloud is geared to the specific needs of the user and
separated physically from other systems.
The term "Software as a Service" (SaaS) is then used at the
application level. The users need not bother about either the
application or scalability or data storage; they simply make use
of the functions of the cloud as provided. But the users have no
influence on and no access to the infrastructure and resources
of the cloud provider.
B
Hybrid
Private
E
Private
Public
C
F
Public
Diagram presenting the different
cloud computing models
CryptoMagazine 2 / 16 | 17
IT infrastructures, among other things,
are made available in the cloud
Risks in the cloud
From certain perspectives, cloud computing offers companies
and organisations various advantages: it greatly reduces
investments in hardware and software licenses or eliminates
them altogether. Nonetheless, users obtain access to a highly
flexible infrastructure that can be adapted at any time to meet
new requirements. The cloud providers take charge of the
installation and maintenance of IT systems, thereby slashing
high personnel costs and enabling users to concentrate on their
core areas of business. Costs can also be reduced in private
clouds if, for instance, services are used centrally instead of
being installed on every individual device.
Along with all the advantages, there are also disadvantages to
using cloud services, especially when it comes to security.
This is particularly true of public and hybrid clouds. Under
certain circumstances, the confidentiality, integrity and
authenticity of the data may be on more than questionable
footing in these types of clouds. When utilising a public or
hybrid cloud, users often do not know where the data is stored.
They therefore have little to no influence on protecting their
data from being viewed (confidentiality) and from it being
18 | CryptoMagazine 2 / 16
changed in undesired ways or damaged (integrity). They have
no other choice but to trust the provider. The secure allocation
of information to the sender (authenticity) may also be difficult
to verify under certain circumstances and entail security risks
especially in sensitive areas.
Public and hybrid clouds
are risky options for secure
communication solutions.
Users of public and hybrid clouds are also at the mercy of the
providers with respect to the availability of services. They have
to rely on the provider's information that it sufficiently protects
its infrastructure physically (e.g. from natural disasters) and
virtually (properly functioning networks). Consequently, public
and hybrid clouds are risky options from a security perspective;
specifically, they are unsuitable for meeting the highest demands
placed on secure and highly secure communication solutions.
Security architecture
By contrast, private clouds can satisfy highly secure standards
if corresponding precautions are taken. One possibility is to
operate the cloud oneself. In other words, the company or the
organisation has its own servers, technologies, applications and
correspondingly qualified IT personnel. Whether the private
cloud is operated internally or externally (or in a hybrid approach), the security requirements remain the same. Ideally,
the security aspects of the information solution are already
considered during the design phase. In other words, the network architecture is orientated toward different information
security zones. These zones, in turn, are formed on the basis
of various classification levels – for instance, CONFIDENTIAL,
SECRET and TOP SECRET. The protective zones are separated
cryptographically from each other. What that means for the
transmission of sensitive and highly sensitive data is that the
data is protected prior to transmission with end-to-end encryption. As a result, only cryptographically protected data is
uploaded into the cloud. The connection from the cloud over
the Internet is encrypted and protected by cryptographic means.
To achieve a high degree of security, cryptography must be
implemented on a protected hardware platform. These devices
are no larger than a cigarette packet and can also be utilised on
the move. To be able to operate a highly secure private cloud,
there are a few more factors to keep in mind. The cloud hardware, for example, must be housed in highly secure rooms.
The expert personnel – internal and external – undergoes a
security check. And perhaps most crucially: employees who
work with cloud services must be duly sensitised to the fact that
they work in a highly secure area. After all, mindful conduct is
central to optimum security.
CryptoMagazine 2 / 16 | 19
Quantum computers:
the supercomputers of the future
Quantum computers solve certain arithmetic problems many times faster than digital computers –
theoretically anyway. Quantum computing is still far from being an actual application and of practical use.
Nevertheless, it is worth contemplating what real quantum computers would mean for the security of
cryptographic systems.
A quantum computer is a computer that functions on the basis
of the laws of quantum mechanics. The theory was developed
in the mid-1920s with a view to understanding the world of the
very tiniest entities. The characteristic trait of the quantum
world is wave-particle duality: subatomic particles can behave
like waves and light waves can behave like particles. A further
aspect is the phenomenon of superposition. That means
particles can do two or a hundred or a million things simultaneously. The quantum world therefore consists of a variety of
overlapping probabilities.
20 | CryptoMagazine 2 / 16
This complexity cannot be calculated with a conventional
computer. That is why the physicist and Nobel Prize winner
Richard Feynman suggested carrying out the calculations of the
quantum world with a quantum computer. Unlike a digital
computer, a quantum computer does not operate on the basis
of the laws of classical physics but instead on the basis of
quantum mechanical states, which go substantially beyond
the rules of the classical theories.
Unlimited possibilities for movements
To understand how quantum computers might work, it is
helpful first to depict the bit of a classical computer as a type
of spherically shaped compass. Its needle is pointing either to
1 (the North Pole) or to 0 (the South Pole) and can change
between these two states by being turned 180 degrees. The
central processing unit of a computer consists of millions of
one-bit switches. The equivalent of a bit in a quantum computer is a qubit. The qubit is similar to the classical sphere. But its
possible movements are not limited to a rotation of 180 degrees.
The qubit can turn by any number of degrees in space.
The quantum mechanical sphere can also point in several
directions at once (superposition). Owing to this extreme
flexibility, a qubit can code more information than a classical
bit. And the computing performance is all the greater because
qubits work with quanta entangled – as if each qubit sphere
were connected by elastic threads to every other qubit – also
known as quantum coherence. Consequently, the performance
of a quantum computer doubles if a single qubit is added. In
contrast, the performance of a classical computer grows linearly
with the number of bits.
Bit
Qubit
0
0
1
1
A bit is either 1 or 0. The qubit plays
an analogous role and serves as the
smallest possible storage unit
CryptoMagazine 2 / 16 | 21
Theoretical studies suggest that if these effects were fully utilised, certain problems in computer science, such as searching
in extremely large databases and factoring extremely long
numbers (dividing a product into its prime factors), could be
done much more efficiently than with classical computers.
We could then solve the mathematical problem on which
the security of several cryptographic processes is based.
Chinese building the first quantum computer
But the quantum computer is currently still a theoretical
concept. The reason is that for a quantum computer to work,
the qubits are allowed to interact solely with each other
(quantum coherence) in order to carry out calculations. That
means they would have to be completely shielded off from the
environment. To bring this situation about, quantum physicists
avail themselves of physical systems: they code the qubits in
a handful of atoms, cool the system to a fraction of a degree
above absolute zero and surround their apparatuses with an
abundance of insulation material to shield out all environmental influences.
On a small scale, several concepts of this kind were tried out in
the laboratory, resulting in quantum computers with a handful
of qubits. In 2011, for instance, Chinese scientists succeeded in
factorising the number 143 into its prime factors (13 and 11)
with the help of only four qubits. This feat makes it clear that
the further development of today's generation of quantum
computers into useful devices remains a huge challenge.
Quantum computing is still far from being an actual
application and of practical use.
The obstacle: although the computing performance increases
with each additional qubit, so too do the problems of maintaining quantum coherence. In other words, decoherence sets
in long before the computer manages to complete even the
simplest calculation.
Efforts are being made to bring about advances in quantum
technology. The EU Commission, for one, has decided to foster
the development of quantum technologies. The programme
is set to begin in 2018 and has one billion euros in funding.
Quantum computing is among the technologies to be developed under this programme.
Cryptographic systems
The question therefore arises as to which information security
solutions could be threatened by quantum computing. There are
basically two types of encryption: symmetric and asymmetric.
22 | CryptoMagazine 2 / 16
■■ Symmetric cryptographic systems: The keys for encrypting
and decrypting a message are identical – both participants
use the same key. Symmetric cryptographic systems enable
high encryption outputs: the Advanced Encryption Standard (AES), for example, is 1,000 times faster than the asymmetric cryptographic system RSA. For symmetric encryption processes, quantum computers pose a relatively minor
threat. After all, the security of a key as measured in bits can
be reduced by the Grover algorithm by half at most. The
boost in computing performance could be countered with
correspondingly long keys.
■■ Asymmetric cryptographic systems: The keys for encrypting and decrypting a message are different. These processes
are also called public key processes. The principle of asymmetric encryption is essentially based on each communication partner generating one pair of keys apiece (consisting of
two keys). One of the keys is kept secret; it is known as the
private key. The second key is made accessible to each participant willing to communicate. This second key is therefore
called the public key. In other words, everyone who knows
the public key can encrypt a message, but only individuals
who know the private key can decrypt that message. Security
comes from the fact that it is impossible to calculate the
private key based on the public key.
Quantum computing is still far
from being an actual application
and of practical use.
Today, RSA is employed for asymmetric encryption processes.
The name RSA comes from the first letter of the last names of
its three inventors: Rivest, Shamir and Adleman. They developed the process in 1977. RSA encryption utilises what are
known as one-way functions. One can imagine these functions
as mathematical one-way streets. The calculation in one direction is very easy (encryption). If one attempts to compute it in
the opposite direction (decrypting without keys), the task
becomes very difficult.
Unsuitable for actual practice
A one-way function of this kind consists of the multiplication
of prime numbers. It is very simple to multiply two prime
numbers. Example: 3,259 times 5,431 equals 17,699,629. But if
the inverse problem is posed, it is much more elaborate to
solve: "What divisors exist for the number 17,699,629?" The
problem is that no fast algorithm is known for factoring a large
number into its prime factors. A conventional computer fails
already in dealing with a 100-digit product. In actual practice,
Quantum computers need thousands of qubits to solve complex calculations
and are thus highly susceptible to disturbances
use is made of 300 to 600-digit products that even the fastest
high-performance computers are unable to factorise again, not
even in concert with each other.
This security is only practical, however, and not theoretical.
RSA encryption would be broken if an efficient algorithm were
found for the problem of factoring. In 1994, Peter Shor invented
an algorithm that can be used on a quantum computer to break
RSA and other common public key systems. But the existing
quantum computers are no faster than conventional computers
and thus far unusable in actual practice.
ing may be changing cryptography, but the ramifications for
existing cryptographic systems differ widely: for most asymmetric cryptographic systems, the current advances could pose
a danger whereas they will not influence symmetric cryptographic systems.
One question remains, nevertheless: How will asymmetric
cryptographic systems be able to be protected in future?
Post-quantum cryptography (PQC) is wrestling with this
question. This sub-field of cryptography deals with cryptographic primitives. Unlike most asymmetric cryptographic
systems currently in use, cryptographic primitives cannot be
decrypted even using quantum computers. Quantum comput-
CryptoMagazine 2 / 16 | 23
Zug
Abu Dhabi
Muscat
Kuala Lumpur
Rio de Janeiro
Fairs
IDEX
In Abu Dhabi from 19 to 23 February 2017
CRYPTO cSEMINARS
cSeminar Information Security Specialists
13 to 17 March 2017
2 to 6 October 2017
cSeminar Technical Vulnerability Testing
9 to 13 October 2017
cSeminar Contemporary Cryptography
Crypto AG
27 to 31 March 2017
P.O. Box 460
16 to 20 October 2017
6301 Zug
Switzerland
The seminars are all held at the Crypto Academy
T +41 41 749 77 22
in Zug / Steinhausen.
F +41 41 741 22 72
[email protected]
Contact and further information
www.crypto.ch
www.crypto.ch/en/products-and-services#seminars
Restricted © Crypto AG. All rights reserved. 671487 / EN / 1609
20 to 24 March 2017